CISA KEV Gaps — Exploited CVEs Missing from KEV

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,361 CVEs tracked 53,621 with exploits 4,857 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,288 vendors 43,840 researchers
607 results Clear all
CVE-2025-30154 8.6 HIGH KEV 1 Writeup EPSS 0.15
reviewdog/action-setup <v1 - RCE
reviewdog/action-setup is a GitHub action that installs reviewdog. reviewdog/action-setup@v1 was compromised March 11, 2025, between 18:42 and 20:31 UTC, with malicious code added that dumps exposed secrets to Github Actions Workflow Logs. Other reviewdog actions that use `reviewdog/action-setup@v1` that would also be compromised, regardless of version or pinning method, are reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos.
CWE-506 Mar 19, 2025
CVE-2025-1316 9.8 CRITICAL KEV EPSS 0.86
Edimax Ic-7100 Firmware - OS Command Injection
Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
CWE-78 Mar 05, 2025
CVE-2025-24472 8.1 HIGH KEV RANSOMWARE EPSS 0.10
Fortinet Fortiproxy < 7.0.20 - Authentication Bypass
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS 7.0.0 through 7.0.16 and FortiProxy 7.2.0 through 7.2.12, 7.0.0 through 7.0.19 may allow a remote unauthenticated attacker with prior knowledge of upstream and downstream devices serial numbers to gain super-admin privileges on the downstream device, if the Security Fabric is enabled, via crafted CSF proxy requests.
CWE-288 Feb 11, 2025
CVE-2025-21590 4.4 MEDIUM KEV EPSS 0.01
Juniper Networks Junos OS <21.2R3-S9, <21.4R3-S10, <22.2R3-S - Priv...
An Improper Isolation or Compartmentalization vulnerability in the kernel of Juniper Networks Junos OS allows a local attacker with high privileges to compromise the integrity of the device. A local attacker with access to the shell is able to inject arbitrary code which can compromise an affected device. This issue is not exploitable from the Junos CLI. This issue affects Junos OS:  * All versions before 21.2R3-S9, * 21.4 versions before 21.4R3-S10,  * 22.2 versions before 22.2R3-S6,  * 22.4 versions before 22.4R3-S6,  * 23.2 versions before 23.2R2-S3,  * 23.4 versions before 23.4R2-S4, * 24.2 versions before 24.2R1-S2, 24.2R2.
CWE-653 Mar 12, 2025
CVE-2025-24993 7.8 HIGH KEV EPSS 0.02
Windows NTFS - Buffer Overflow
Heap-based buffer overflow in Windows NTFS allows an unauthorized attacker to execute code locally.
CWE-122 Mar 11, 2025
CVE-2025-24991 5.5 MEDIUM KEV EPSS 0.01
Windows NTFS - Info Disclosure
Out-of-bounds read in Windows NTFS allows an authorized attacker to disclose information locally.
CWE-125 Mar 11, 2025
CVE-2025-24984 4.6 MEDIUM KEV EPSS 0.03
Windows NTFS - Info Disclosure
Insertion of sensitive information into log file in Windows NTFS allows an unauthorized attacker to disclose information with a physical attack.
CWE-532 Mar 11, 2025
CVE-2025-24983 7.0 HIGH KEV EPSS 0.01
Windows Win32 Kernel Subsystem - Privilege Escalation
Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally.
CWE-416 Mar 11, 2025
CVE-2025-25181 5.8 MEDIUM KEV EPSS 0.72
Advantive VeraCore <2025.1.0 - SQL Injection
A SQL injection vulnerability in timeoutWarning.asp in Advantive VeraCore through 2025.1.0 allows remote attackers to execute arbitrary SQL commands via the PmSess1 parameter.
CWE-89 Feb 03, 2025
CVE-2025-22226 7.1 HIGH KEV RANSOMWARE EPSS 0.04
VMware ESXi, Workstation, and Fusion - Info Disclosure
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
CWE-125 Mar 04, 2025
CVE-2025-22225 8.2 HIGH KEV RANSOMWARE EPSS 0.10
VMware ESXi - Privilege Escalation
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
CWE-123 Mar 04, 2025
CVE-2025-22224 9.3 CRITICAL KEV RANSOMWARE EPSS 0.47
VMware ESXi, Workstation - Code Injection
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
CWE-367 Mar 04, 2025
CVE-2025-24989 8.2 HIGH KEV EPSS 0.32
Power Pages - Privilege Escalation
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.
CWE-284 Feb 19, 2025
CVE-2025-0111 6.5 MEDIUM KEV EPSS 0.04
Palo Alto Networks PAN-OS - Info Disclosure
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
CWE-610 Feb 12, 2025
CVE-2025-23209 8.0 HIGH KEV 1 Writeup EPSS 0.18
Craftcms Craft Cms < 4.13.8 - Code Injection
Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. This is an remote code execution (RCE) vulnerability that affects Craft 4 and 5 installs where your security key has already been compromised. Anyone running an unpatched version of Craft with a compromised security key is affected. This vulnerability has been patched in Craft 5.5.8 and 4.13.8. Users who cannot update to a patched version, should rotate their security keys and ensure their privacy to help migitgate the issue.
CWE-94 Jan 18, 2025
CVE-2025-24200 6.1 MEDIUM KEV EPSS 0.47
Apple Ipados < 15.8.4 - Incorrect Authorization
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.1 and iPadOS 18.3.1, iPadOS 17.7.5. A physical attack may disable USB Restricted Mode on a locked device. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.
CWE-863 Feb 10, 2025
CVE-2025-21418 7.8 HIGH KEV EPSS 0.13
Microsoft Windows 10 1607 < 10.0.10240.20915 - Heap Buffer Overflow
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CWE-122 Feb 11, 2025
CVE-2025-21391 7.1 HIGH KEV EPSS 0.05
Microsoft Windows 10 1507 < 10.0.10240.20915 - Symlink Following
Windows Storage Elevation of Privilege Vulnerability
CWE-59 Feb 11, 2025
CVE-2025-23006 9.8 CRITICAL KEV RANSOMWARE EPSS 0.61
Sonicwall Sma8200v < 12.4.3-02854 - Insecure Deserialization
Pre-authentication deserialization of untrusted data vulnerability has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC), which in specific conditions could potentially enable a remote unauthenticated attacker to execute arbitrary OS commands.
CWE-502 Jan 23, 2025
CVE-2025-21335 7.8 HIGH KEV EPSS 0.09
Microsoft Windows 10 21h2 < 10.0.19044.5371 - Use After Free
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
CWE-416 Jan 14, 2025